Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Columns & Departments

Eminent Domain Law Image

Eminent Domain Law

ALM Staff & Law Journal Newsletters

An in-depth look at a condemnation proceeding.

What's the Big (Data) Deal? Image

What's the Big (Data) Deal?

Timothy J. Toohey

In our increasingly data-intensive world, Big Data is proclaimed by its proponents as bringing about a new era of innovation and economic growth. But as increasingly large amounts of data are collected, stored and analyzed about individuals, privacy advocates have also raised concerns that Big Data may endanger, if not end, personal privacy.

Columns & Departments

Cooperatives & Condominiums Image

Cooperatives & Condominiums

ALM Staff & Law Journal Newsletters

Discussion of two major rulings.

How Much Deference Do Zoning Ordinances Deserve? Image

How Much Deference Do Zoning Ordinances Deserve?

Stewart E. Sterk

To what extent can a municipality's zoning ordinance distinguish among commercial enterprises, and what evidence must a municipality produce to justify distinctions among commercial enterprises?

Features

International e-Commerce and e-Discovery Image

International e-Commerce and e-Discovery

Christopher P. DePhillips & Heather B. Siegelheim

This article focuses on the conflict between U.S. and EU discovery procedures, and offers some useful and practical advice for U.S. litigants who may face uncertain territory when seeking discovery abroad.

CA Data Privacy Bill Would Undo Apple's Win Image

CA Data Privacy Bill Would Undo Apple's Win

Cheryl Miller

Online retailers in California could be held liable for requiring anything more than a ZIP code from credit card and debit card customers to complete a transaction under proposed legislation unveiled on March 20.

Decisions of Interest Image

Decisions of Interest

ALM Staff & Law Journal Newsletters

Analysis of a major ruling.

Selling a Franchise Company to an ESOP Image

Selling a Franchise Company to an ESOP

Nick Adamy

Business owners exploring exit planning options may have been introduced to the idea of selling some or all of their stock to an Employee Stock Ownership Plan.

NJ & CT News Image

NJ & CT News

ALM Staff & Law Journal Newsletters

What's happening in neighboring states.

Features

Courts Address Clickwrap and Electronic Contracting Image

Courts Address Clickwrap and Electronic Contracting

Richard Raysman & Peter Brown

This article reviews the various types of online agreements, including the more modern hybrid clickwrap transactions, as well as the characteristics of enforceable online agreements.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Inferring Dishonesty: The Fifth Amendment and Fidelity Coverage
    Dishonest employees always have posed a problem for businesses. The average business may lose 6% of its annual revenues to employee fraud, and cumulatively the impact of employee theft on the economy is estimated to be $600 billion annually. <i>See</i> Association of Certified Fraud Examiners ("ACFE"), 2002 Report to the Nation on Occupational Fraud &amp; Abuse, at ii, 4 (2002), available at <i>www.cfenet.com/publications/rttn.asp.</i> Although the average loss through employee embezzlement is $25,000, where computerized financial records or transactions are involved, the average loss increases nearly twentyfold. <i>See</i> National White Collar Crime Center, <i>WCC Issue: Embezzlement/Employee Theft,</i> at 2 (2002), available at <i>http://nw3c.org/downloads/Computer_Crime_Weapon.pdf.</i>
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›